-
Notifications
You must be signed in to change notification settings - Fork 203
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Migrate ( metasploit, exploit-db, kev ) to aboutcode pipeline.
Set data_source as the header for the exploit table. Squash the migration files into a single file. Add test for exploit-db , metasploit Add a missing migration file Rename resources_and_notes to notes Fix Api test Refactor metasploit , exploitdb , kev improver Rename Kev tab to exploit tab Add support for exploitdb , metasploit, kev Signed-off-by: ziadhany <ziadhany2016@gmail.com>
- Loading branch information
Showing
15 changed files
with
750 additions
and
158 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,131 @@ | ||
# Generated by Django 4.1.13 on 2024-09-10 18:40 | ||
|
||
from django.db import migrations, models | ||
import django.db.models.deletion | ||
|
||
|
||
class Migration(migrations.Migration): | ||
|
||
dependencies = [ | ||
("vulnerabilities", "0062_package_is_ghost"), | ||
] | ||
|
||
operations = [ | ||
migrations.CreateModel( | ||
name="Exploit", | ||
fields=[ | ||
( | ||
"id", | ||
models.AutoField( | ||
auto_created=True, primary_key=True, serialize=False, verbose_name="ID" | ||
), | ||
), | ||
( | ||
"date_added", | ||
models.DateField( | ||
blank=True, | ||
help_text="The date the vulnerability was added to an exploit catalog.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"description", | ||
models.TextField( | ||
blank=True, | ||
help_text="Description of the vulnerability in an exploit catalog, often a refinement of the original CVE description", | ||
null=True, | ||
), | ||
), | ||
( | ||
"required_action", | ||
models.TextField( | ||
blank=True, | ||
help_text="The required action to address the vulnerability, typically to apply vendor updates or apply vendor mitigations or to discontinue use.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"due_date", | ||
models.DateField( | ||
blank=True, | ||
help_text="The date the required action is due, which applies to all USA federal civilian executive branch (FCEB) agencies, but all organizations are strongly encouraged to execute the required action", | ||
null=True, | ||
), | ||
), | ||
( | ||
"notes", | ||
models.TextField( | ||
blank=True, | ||
help_text="Additional notes and resources about the vulnerability, often a URL to vendor instructions.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"known_ransomware_campaign_use", | ||
models.BooleanField( | ||
default=False, | ||
help_text="Known' if this vulnerability is known to have been leveraged as part of a ransomware campaign; \n or 'Unknown' if there is no confirmation that the vulnerability has been utilized for ransomware.", | ||
), | ||
), | ||
( | ||
"source_date_published", | ||
models.DateField( | ||
blank=True, | ||
help_text="The date that the exploit was published or disclosed.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"exploit_type", | ||
models.TextField( | ||
blank=True, | ||
help_text="The type of the exploit as provided by the original upstream data source.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"platform", | ||
models.TextField( | ||
blank=True, | ||
help_text="The platform associated with the exploit as provided by the original upstream data source.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"source_date_updated", | ||
models.DateField( | ||
blank=True, | ||
help_text="The date the exploit was updated in the original upstream data source.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"data_source", | ||
models.TextField( | ||
blank=True, | ||
help_text="The source of the exploit information, such as CISA KEV, exploitdb, metaspoit, or others.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"source_url", | ||
models.URLField( | ||
blank=True, | ||
help_text="The URL to the exploit as provided in the original upstream data source.", | ||
null=True, | ||
), | ||
), | ||
( | ||
"vulnerability", | ||
models.ForeignKey( | ||
on_delete=django.db.models.deletion.CASCADE, | ||
related_name="exploits", | ||
to="vulnerabilities.vulnerability", | ||
), | ||
), | ||
], | ||
), | ||
migrations.DeleteModel( | ||
name="Kev", | ||
), | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.